Classifying Malware Using Tensor Decomposition

ME Eren, BS Alexandrov, C Nicholas - Malware: Handbook of Prevention …, 2024 - Springer
Tensor decomposition is a powerful unsupervised machine learning technique capable of
modeling multidimensional data, including that related to malware. This chapter discusses a …

[HTML][HTML] Continual Semi-Supervised Malware Detection

M Chin, R Corizzo - Machine Learning and Knowledge Extraction, 2024 - mdpi.com
Detecting malware has become extremely important with the increasing exposure of
computational systems and mobile devices to online services. However, the rapidly evolving …

SS-MVMETRO: Semi-supervised multi-view human mesh recovery transformer

S Sheng, T Zheng, Z Ren, Y Zhang, W Fu - Applied Intelligence, 2024 - Springer
Parametric methods are widely utilized in RGB-based human mesh recovery, relying on
precise statistical human body model parameters that are challenging to obtain. In contrast …

Catch'em all: Classification of Rare, Prominent, and Novel Malware Families

ME Eren, R Barron, M Bhattarai… - … on Digital Forensics …, 2024 - ieeexplore.ieee.org
National security is threatened by malware, which remains one of the most dangerous and
costly cyber threats. As of last year, researchers reported 1.3 billion known malware …

Binary Bleed: Fast Distributed and Parallel Method for Automatic Model Selection

R Barron, ME Eren, M Bhattarai, I Boureima… - arXiv preprint arXiv …, 2024 - arxiv.org
In several Machine Learning (ML) clustering and dimensionality reduction approaches, such
as non-negative matrix factorization (NMF), RESCAL, and K-Means clustering, users must …

Electrical Grid Anomaly Detection via Tensor Decomposition

AB Most, ME Eren, BS Alexandrov… - MILCOM 2023-2023 …, 2023 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) systems often serve as the nervous
system for substations within power grids. These systems facilitate real-time monitoring, data …

Advanced Semi-Supervised Tensor Decomposition Methods for Malware Characterization

ME Eren - 2024 - search.proquest.com
Malware continues to be one of the most dangerous and costly cyber threats to national
security. As of last year, over 1.3 billion malware specimens have been documented …

[PDF][PDF] A Complete Bibliography of ACM Transactions on Privacy and Security (TOPS)

NHF Beebe - 2024 - netlib.sandia.gov
A Complete Bibliography of ACM Transactions on Privacy and Security (TOPS) Page 1 A
Complete Bibliography of ACM Transactions on Privacy and Security (TOPS) Nelson HF …